Design and Implementation of a Context-Based Security Model

被引:0
|
作者
Iijima, Tadashi [1 ]
Kido, Satoshi [1 ]
机构
[1] Keio Univ, Fac Sci & Technol, Tokyo 108, Japan
来源
KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014 | 2014年 / 466卷
关键词
Access Control Model; Context Sensibility; XACML; Domain Specific Language; PETRI NETS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a context-based security model and describes one of the design and implementation of enforcement mechanism of it. In this access control model, a kind of object-oriented petri-net with nets-within-nets semantics is adopted as a context representation. This approach is, particularly, expected to be suitable for dynamic access control within inter-organizational business processes. The overall architecture of the access control model is designed by extending XACML standard architecture. And a Scala-based internal Domain Specific Language is designed to specify security policies.
引用
收藏
页码:356 / 370
页数:15
相关论文
共 50 条
  • [31] A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model
    Bera, P.
    Maity, Soumya
    Ghosh, S. K.
    Dasgupta, Pallab
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 232 - +
  • [32] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [33] Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions
    Holderer, Julius
    Carmona, Josep
    Taymouri, Farbod
    Mueller, Guenter
    TRANSACTIONS ON PETRI NETS AND OTHER MODELS OF CONCURRENCY XII, 2017, 10470 : 43 - 69
  • [34] Fuzzy Classification Context for the Responsive and Formal Design Process
    Gebreyohannes, Solomon
    Edmonson, William
    Esterline, Albert
    Homaifar, Abdollah
    Kibret, Nadew
    2017 11TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2017, : 636 - 643
  • [35] A Design Method of Consumer Electronics Products Based on Supervisory Control and Model Checking
    Yamaguchi, Shingo
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2018,
  • [36] From Requirements to Code (Re2Code) - A Model-Based Approach for Controller Implementation
    Brito, Isabel Sofia
    Barros, Joao Paulo
    Gomes, Luis
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1224 - 1230
  • [37] Design and implementation of domain-specific language easytime
    Fister, Iztok, Jr.
    Fister, Iztok
    Mernik, Marjan
    Brest, Janez
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2011, 37 (04) : 151 - 167
  • [38] DESIGN AND IMPLEMENTATION OF DEADLOCK CONTROL FOR AUTOMATED MANUFACTURING SYSTEMS
    Kaid, H.
    Al-Ahmari, A.
    El-Tamimi, A. M.
    Nasr, E. Abouel
    Li, Z.
    SOUTH AFRICAN JOURNAL OF INDUSTRIAL ENGINEERING, 2019, 30 (01) : 1 - 23
  • [39] Design and implementation of an access control processor for XML documents
    Damiani, E
    di Vimercati, SD
    Paraboschi, S
    Samarati, P
    COMPUTER NETWORKS, 2000, 33 (1-6) : 59 - 75
  • [40] Towards a multi-model views security framework
    Xia, Lei
    Huang, Hao
    Yu, Shuying
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 98 - 101